{"url":"http://public2.vulnerablecode.io/api/packages/77971?format=json","purl":"pkg:ebuild/app-crypt/mit-krb5@1.13","type":"ebuild","namespace":"app-crypt","name":"mit-krb5","version":"1.13","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.13.2-r2","latest_non_vulnerable_version":"1.21.2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49821?format=json","vulnerability_id":"VCID-4e9j-8vtc-tbda","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0477.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0477.html"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5351","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57401","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57412","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57294","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57338","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/97028","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/97028"},{"reference_url":"https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:224","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:224"},{"reference_url":"http://www.securityfocus.com/bid/70380","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70380"},{"reference_url":"http://www.securitytracker.com/id/1031003","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031003"},{"reference_url":"http://www.ubuntu.com/usn/USN-2498-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2498-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145425","reference_id":"1145425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145425"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479","reference_id":"762479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5351","reference_id":"CVE-2014-5351","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5351"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77971?format=json","purl":"pkg:ebuild/app-crypt/mit-krb5@1.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.13"}],"aliases":["CVE-2014-5351"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4e9j-8vtc-tbda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49819?format=json","vulnerability_id":"VCID-9d6t-z5dr-yqgy","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc","reference_id":"","reference_type":"","scores":[],"url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4343","reference_id":"","reference_type":"","scores":[{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91757","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91769","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/60082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60082"},{"reference_url":"http://secunia.com/advisories/60448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60448"},{"reference_url":"http://secunia.com/advisories/61052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61052"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95211","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95211"},{"reference_url":"https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f"},{"reference_url":"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.osvdb.org/109390","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/109390"},{"reference_url":"http://www.securityfocus.com/bid/69159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69159"},{"reference_url":"http://www.securitytracker.com/id/1030706","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121876","reference_id":"1121876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121876"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520","reference_id":"755520","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4343","reference_id":"CVE-2014-4343","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4343"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77971?format=json","purl":"pkg:ebuild/app-crypt/mit-krb5@1.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.13"}],"aliases":["CVE-2014-4343"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9d6t-z5dr-yqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49818?format=json","vulnerability_id":"VCID-rmt9-dmmb-kkec","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc","reference_id":"","reference_type":"","scores":[],"url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4341","reference_id":"","reference_type":"","scores":[{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94477","published_at":"2026-05-09T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94467","published_at":"2026-05-07T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94396","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.9443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.9446","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/60082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60082"},{"reference_url":"http://secunia.com/advisories/60448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60448"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94904","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94904"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165"},{"reference_url":"http://www.securityfocus.com/bid/68909","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68909"},{"reference_url":"http://www.securitytracker.com/id/1030706","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116180","reference_id":"1116180","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116180"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624","reference_id":"753624","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4341","reference_id":"CVE-2014-4341","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4341"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1245","reference_id":"RHSA-2014:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77971?format=json","purl":"pkg:ebuild/app-crypt/mit-krb5@1.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.13"}],"aliases":["CVE-2014-4341"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmt9-dmmb-kkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49820?format=json","vulnerability_id":"VCID-vr9b-gwxs-fqgg","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-1255.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-1255.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1255.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1255.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4345","reference_id":"","reference_type":"","scores":[{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93595","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93495","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.9352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93547","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93553","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.9356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93564","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.9357","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4345"},{"reference_url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/59415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59415"},{"reference_url":"http://secunia.com/advisories/59993","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59993"},{"reference_url":"http://secunia.com/advisories/60535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60535"},{"reference_url":"http://secunia.com/advisories/60776","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60776"},{"reference_url":"http://secunia.com/advisories/61314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61314"},{"reference_url":"http://secunia.com/advisories/61353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61353"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95212","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95212"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1"},{"reference_url":"https://github.com/krb5/krb5/pull/181","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/pull/181"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.osvdb.org/109908","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/109908"},{"reference_url":"http://www.securityfocus.com/bid/69168","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69168"},{"reference_url":"http://www.securitytracker.com/id/1030705","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030705"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128157","reference_id":"1128157","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128157"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416","reference_id":"757416","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4345","reference_id":"CVE-2014-4345","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4345"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1255","reference_id":"RHSA-2014:1255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77971?format=json","purl":"pkg:ebuild/app-crypt/mit-krb5@1.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.13"}],"aliases":["CVE-2014-4345"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9b-gwxs-fqgg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.13"}